The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Understanding how M1 neurons innervate flexible coordinated upper limb reaching and grasping is important for BMI systems that attempt to reproduce the same actions. In this paper, we presented a study for exploring M1 neuronal activities while a non-human primate subject was guided to finish different visual cued spatial reaching and grasping tasks. By applying various configurations of target objects...
A set of schemes for automated discrimination of gait patterns based on recognition of surface electromyogram (sEMG) of human lower limbs is proposed to classify 3 different terrains and 6 different movement patterns. To compare the recognition performance of different classifiers, Back Propagation Neural Networks (BPNNs) and Process Neural Networks (PNNs) are deployed to discriminate gait patterns...
In this paper multilinear mean component analysis (MMCA) is introduced as a new algorithm for gait recognition. Compared with traditional PCA and MPCA, the new method MMCA is based on dimensionality reduction by preserving the squared length, and implicitly also the direction of the mean vector of the each mode's original input. The solution is not necessarily corresponding to the top eigenvalues...
With the rapid proliferation of diverse online social network sites, user recommendation has been received unprecedented attention. At present, the methods for user recommendation are mainly divided into two categories: recommending a new friend for a target user according to similar interest, or by friendships similarity between the two users. The first category methods have high recall but low precision,...
This paper proposes a new network-wide optimized time division multiple access (TDMA) scheduling scheme for wireless sensor networks (WSNs). It can simultaneously achieve maximum throughput and fair rate allocation given the requirement of network lifetime. To achieve this object, we first formulate the rate allocation problem based on the Lexicographic Max-Min (LMM) criterion, which takes fairness,...
Behavioral targeting (BT) is a valuable tool for online advertising. In this paper, we study a new problem of incorporating social information into traditional behavior targeting models. Specifically, we present a social regularization based Poisson regression framework for behavior targeting. Based on the observation that social information can be diverse and competing, we furthermore present two...
This paper introduces a nonlinear control scheme based on linearized state space representation of the nonlinear Permanent Magnet Synchronous Motor (PMSM) model and predictive concept to control the PMSM. A comprehensive and detailed description of the design process of a Generalized Predictive Control (GPC) design and implementation with Hildreth's Quadratic Programming for the permanent-magnet synchronous...
Concerning the high encoding complexity of LDPC codes, an efficient encoder based on block-row-cycle structure for CMMB is proposed, which is able to take full advantage of the characteristics of the sparse parity-check matrix, such as cyclicity and equality of row weight. Experimental results show that the proposed encoder can reduce dramatically the memory requirements in hardware implementation,...
Memory partitioning is widely adopted to efficiently increase the memory bandwidth by using multiple memory banks and reducing data access conflict. Previous methods for memory partitioning mainly focused on one-dimensional arrays. As a consequence, designers must flatten a multidimensional array to fit those methodologies. In this work we propose an automatic memory partitioning scheme for multidimensional...
This paper presents a numerical method to calculate the aerodynamic force and torque for the complex spacecraft considering components blocking. The Square Division Method (SDM) is applied to analyze and therefore evaluate the space station's structure. The efficiency and accuracy of the SDM are investigated in the simulation section primarily. Then major structures of the space station are analyzed...
While end-users enjoy the data service mashup with high convenience and flexibility, how to achieve the best performance with minimum maintenance cost is a challenging problem. In this paper, the data maintenance problem is analyzed, and the maintenance cost model for the data service mashup is built. The model measures the response cost and update cost of a group of data service mashups in terms...
In this paper, the improved spread spectrum (ISS) modulation is modified and extended to cancel the host interference in the context of watermark decoding with unmatched filtering, where the reference sequence at the watermark decoder does not match with the embedded sequence. Then a robust and transparent audio watermarking scheme based on this extended ISS and a psychoacoustic model is proposed...
Multimedia stream monitoring refers to removing unwanted and malicious records from multimedia streams. In this application, a large number of filtering queries are registered on time-critical multimedia streams. Each filtering query contains multiple meta filters and a meta filter is shared among multiple filtering queries. The filtering queries and meta filters form a bipartite graph, and the objective...
Though providing an intrinsic secrecy, network coding is still vulnerable to eavesdropping attacks, by which an adversary may compromise the confidentiality of message content. Existing studies mainly deal with eavesdroppers that can intercept a limited number of packets. However, real scenarios often consist of more capable adversaries, e.g., global eavesdroppers, which can defeat these techniques...
This thesis considers the expected rate of return and risk (variance) comprehensively, proposes the optimal utility maximizing portfolio selection model with different lending and borrowing rate of risk-free asset. It has significance in theory and practice. In this paper, considering the expected rate of the return of the portfolio and its risk (variance), we proposed a maximizing the utility portfolio...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.